Hi [[ session.user.profile.firstName ]]

Audit and Compliance

  • Take your Incident Response plan to a whole new level!
    Take your Incident Response plan to a whole new level! Gary Southwell, General Manager, CSPi & John Black, Cisco Recorded: Oct 17 2017 44 mins
    In this webinar, join Cisco and CSPi as they discuss how automated breach notification takes Cisco’s incident response services to a whole new level. With FirePOWER and nVoy the incident response process can start immediately after a breach is verified and therefore be completed faster, in some cases the full impact of a breach can be determined in minutes.

    This can be extremely powerful for companies which rely on managed services providers for their cyber breach incident response strategy. With FirePOWER and nVoy Cisco’s IR professional services team will proactively monitor the solution for you and will receive email notifications when a potential incident is occurring against your organizations critical assets to trigger IR activity as per services contract.

    Shortening the breach identification and investigation phase provides several benefits:
    - Meet stringent data privacy compliance regulations, like GDPR
    - Focus efforts on effective forensic analysis and remediation
    - Limit breach exposure and the expenses related to handling breaches

    Up your incident response game!
  • Bringing Order to the Chaos of Third Party Risk Management
    Bringing Order to the Chaos of Third Party Risk Management Sam Abadir, Director of Product Management, LockPath; Dan Schrotberger, Director of Sales Engineering, LockPath Recorded: Oct 17 2017 41 mins
    The complexity of vendor risk management increases every day, as does its importance to organizations that rely on third parties. Regulators are increasing their focus on potential third-party risk. Risks assessments for business processes and vendor management are being integrated, mapped to organizational risks, and mined for patterns and trends. Some organizations are even extending vendor risk management to assess the vendors of vendors.

    Assessing and monitoring vendors and third parties is an arduous task if conducted manually. A manual process of inputting data, assigning risk levels, and following up requires multiple employees dedicating numerous hours. A manual process also makes it difficult to ensure harmony between an organization’s policies, regulatory requirements and those of the vendor or supplier.

    On the other hand, a robust governance, risk management, and compliance system like the Keylight Platform can help organizations identify, classify, monitor, and recommend risk mitigation to support business operations and regulatory requirements.

    In this webinar, LockPath’s vendor risk management experts provide an overview of the challenges to efficient and effective vendor risk management, and they demonstrate how GRC can bring order to the chaos of vendor risk management.
  • Governance, Risk, and Automation: Part 1
    Governance, Risk, and Automation: Part 1 Peter Tessin, Sr. Manager, Discover Financial Services; Jimmy Heschl, Head of Digital Security, Redbull Recorded: Oct 13 2017 61 mins
    This is the first in a two-part series on governance, risk and automation.

    In Part I, we will explore concepts central to IT governance and risk. The presenters will use a conversational style to describe IT governance, how it works, and then go deeper into one central aspect, risk.

    Part II will build on the foundation presented in part one and describe how these issues are managed in an automated solution.
  • Increasing the Effectiveness and Efficiency of Sarbanes-Oxley
    Increasing the Effectiveness and Efficiency of Sarbanes-Oxley Dennis Keglovits, Vice President of Services, LockPath Recorded: Oct 13 2017 51 mins
    While the Sarbanes-Oxley Act (SOX) has been in place for over a decade, many public companies still have questions regarding the efficiency, and even effectiveness, of their overall SOX compliance and audit programs. With room for improvement, companies are considering solutions to automate the process, reduce efforts to complete testing, and better manage the remediation process.

    In this webinar, LockPath’s Vice President of Services, Dennis Keglovits, discusses the common challenges SOX compliance poses in today’s organizations, as well as strategies and techniques to assist your programs.
  • Running Oracle Software on POWER/AIX in the Skytap Cloud
    Running Oracle Software on POWER/AIX in the Skytap Cloud Mike Stone, CIO, House of Brick Technologies; Dan Jones, Director of Product Management, Skytap Recorded: Oct 12 2017 36 mins
    In this session we will provide an overview of licensing Oracle programs using Infrastructure as a Service (IaaS) on POWER/AIX VMs in the Skytap Cloud. There is a lot of confusion around Oracle licensing, especially in virtualized or cloud environments. Many of the references to discussion points and legal challenges resulting from running virtualized x86 platforms apply directly to POWER environments as well.

    Key takeaways from this webinar include:

    - Skytap Cloud is an effective option for IaaS, including for Oracle-based POWER/AIX applications.
    - The use of POWER/AIX VMs for Oracle workloads in Skytap Cloud ensures that Oracle workloads stay running only on licensed processors.
    - Skytap Cloud provides support for Oracle licensing by allocating dedicated resources to Oracle workloads.
    - In an Oracle audit, usage of Skytap Cloud environments will be documented as if the LPARs or servers are part of the customer’s on-premises environment.
  • ACEDS Webcast: On Premise or Off Premise? A Look at eDiscovery Security
    ACEDS Webcast: On Premise or Off Premise? A Look at eDiscovery Security Doug Austin and Tom O'Connor Recorded: Oct 11 2017 61 mins
    Today, when consumers are considering their eDiscovery technology choices, there are more factors to consider than ever. In addition to considering the functionality of the software application, you now also have to consider whether to buy or “rent” the application, how the software is delivered to you and whether it’s required to be within your firewall or can be an off-premises solution. This CLE-approved* webcast session will discuss different on-premise and off-premise eDiscovery solution options and considerations for each. Key topics include:

    + Drivers for eDiscovery Technology Solution Decisions Today
    + eDiscovery Industry Market Trends and Their Relation to General Industry Trends
    + What Law Firms are Saying about the Technology
    + What Industry Analysts are Saying about the Technology
    + The Cloud vs. No Cloud Debate
    + Why Not All Cloud Solutions Are the Same
    + A Comparative Approach to eDiscovery Technology
    + Putting a Face on Solutions and Risks
    + Key Components of an eDiscovery Technology Solution

    Panel Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters where he has worked on numerous major cases, most recently the BP litigation. He has also been appointed as a technical consultant by various federal and state courts on cases dealing with large amounts of electronic evidence and specializes in negotiating ESI exchange protocols.

    * MCLE Approved in Selected States
  • Bringing Order to the Chaos of Compliance Policy Management
    Bringing Order to the Chaos of Compliance Policy Management Sam Abadir, Director of Product Management, LockPath Recorded: Oct 11 2017 44 mins
    Managing policies, procedures and guidelines in a cost effective and compliant way is becoming more and more difficult using office tools like word processors, spreadsheets and email. The process of drafting, approving, updating and creating awareness around these compliance documents as well as the complexity of keeping up with regulatory and contractual compliance requirements using these tools quickly creates chaos. To compound the problem, these office tools make internal audits more time consuming and costly and make regulatory audits and legal challenges difficult to defend.

    This is why organizations large and small are turning to automated compliance and policy management to manage their compliance programs. In this webinar, LockPath’s Sam Abadir will discuss the latest trends and challenges in policy management and compliance, and how implementing GRC processes can bring order to all this chaos.
  • The Power of Evident
    The Power of Evident Evident Recorded: Oct 10 2017 2 mins
    Safely and securely share verified personal information. We simplify the complicated world of personal data and security by taking you out of the middle of it.
  • CLIENT UPDATE: SBA Updates Environmental Guidance with New SOP 50 10 5(J)
    CLIENT UPDATE: SBA Updates Environmental Guidance with New SOP 50 10 5(J) James Haberlen, Managing Director, Lender Solutions, EDR Recorded: Oct 10 2017 32 mins
    EDR will share the late-breaking changes to the SBA’s SOP 50 10 5—the agency’s first update to its environmental guidance since 2014 (when it adopted the revised ASTM Phase I E 1527 standard). Speakers will share details on the changes coming out October 1 and effective in January 2018. Don’t miss this timely update on what this round of changes mean to the environmental due diligence required on any loans seeking the agency’s approval. Benefits:
    -what’s changing?
    -latest statistics on SBA lending volumes
    -a primer on SBA’s tiered process for environmental investigations

    Join us for the latest!
  • Conseguir la excelencia operacional en el comercio minorista omnicanal
    Conseguir la excelencia operacional en el comercio minorista omnicanal Maarten Tromp, Director de Product Management en Openbravo Recorded: Oct 10 2017 53 mins
    La excelencia operativa es más importante que nunca en el entorno actual del retail omnicanal. El aumento de las expectativas de los clientes y la mayor competencia a través de los distintos canales desvelarán rápidamente a aquellos minoristas que no cumplen sus promesas. Esto ha llevado a los minoristas a explorar qué estrategias de excelencia operativa son las que mejor apoyan la evolución de las tiendas físicas y los flujos de trabajo multidireccionales requeridos para la venta al por menor de omnicanal. Para lograr este objetivo, el software de venta minorista ofrece herramientas indispensables – integración de datos, operaciones y tecnología – que son requisitos previos para operar con éxito en un entorno omnicanal.
    Lo que aprendera:
    Este webinar revisa los principales principios de la excelencia operacional y los nuevos retos y procesos operativos exigidos por el retail omnicanal. Usted aprenderá una plataforma de comercio moderno como Openbravo puede ayudarle a aplicar los principios de excelencia operacional y hacer prosperar su negocio de retail omnicanal.
  • The TeleWare Microsoft Story
    The TeleWare Microsoft Story Mark Elwood Recorded: Oct 10 2017
    TeleWare work in collaboration with Microsoft to help our partners and their customers achieve more through better communications. This short video explains how.
  • Achieving Operational Excellence in Omnichannel Retail
    Achieving Operational Excellence in Omnichannel Retail Maarten Tromp, Director of Product Management at Openbravo Recorded: Oct 10 2017 46 mins
    Operational excellence is more important than ever in today’s omnichannel retail environment. Heightened customer expectations and more competition across the various channels will swiftly unravel retailers who fail to deliver on their promises. This has led retailers to explore which operational excellence strategies best support the evolution of physical stores and the multidirectional workflows required for omnichannel retail. To achieve this end, retail software offers indispensible tools – integrating the data, operations, and technology – which are prerequisites for operating successfully in an omnichannel environment.
    What you will learn:
    This webinar reviews the main principles of operational excellence and why they are essential in omnichannel retail. You will learn how a modern commerce platform such as Openbravo can help you apply the principles of operational excellence and to make your omnichannel retail business thrive.
  • Incident Response Planning: 6 Steps to Prepare your Organization
    Incident Response Planning: 6 Steps to Prepare your Organization Jeff Wilder, Director of PCI Services, Kirkpatrick Price; Sam Abadir, Director of Product Management, LockPath Recorded: Oct 9 2017 49 mins
    Data breaches make the headlines daily, and as a result, cyberattacks concern all business owners. Could I be next? And how can I prepare? As technology continues to evolve, so do the ever-present threats associated with these types of risks. You’re likely already taking steps towards protecting your organization from the possibility of a breach or cyberattack, but have you planned what you will do to continue operations and minimize damages in the event that your environment is compromised?

    Join LockPath and KirkpatrickPrice as we discuss incident response best practices. In this 60-minute webinar, attendees will discover the six stages of a best-practice incident response program, lessons learned from high-profile breaches, and how the Keylight Platform can effectively implement this strategy.
  • Legal Landmines: How Changing Collection Laws Can Affect YOUR Business
    Legal Landmines: How Changing Collection Laws Can Affect YOUR Business Michelle Kreidler Dove, Esq. Recorded: Oct 4 2017 60 mins
    The dynamic nature of collection rules and regulations has many businesses and healthcare facilities unclear as to how far they can go in pursuit of delinquent accounts. This free, on-demand webcast will educate and engage viewers with insightful tips for effectively and safely refining their internal collections practices.
    You’ll learn tips such as:
    How to ensure accurate and effective credit reporting
    Why recent changes in case law should have you rethinking your current processes
    What Important information should be included in your consumer agreement
    How you can work with your collection agency to maximize recoveries.

    Michelle Kreidler Dove, Esq., General Counsel and Chief Compliance Officer at IC System leads this engaging presentation that will answer your most pressing collections-law related questions. You’ll benefit by taking cues and lessons learned from the experts at I.C. System, a family-owned, Seventy-nine year old collection agency.
  • How the US Secret Service combats advanced ransomware
    How the US Secret Service combats advanced ransomware Amar Singh, Mark Grantz, Chris Payne, Brian Laing, Ronny Wolf Recorded: Oct 4 2017 60 mins
    Following on from our popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next", we bring to you our next special episode with US Secret Service Special Agent Mark Grantz.

    If you think criminals are bored of Ransomware, think again! The ransomware market is anything but boring. Criminals are continuing to flock to ransomware as the barriers to entry, RaaS or ransomware-as-a-service, make it easy for anyone to try their luck at digital extortion. The authors behind Cerber — currently the most prominent ransomware family — release updated variants every 8.4 days on average!

    Join Amar Singh, global CISO and CEO of Cyber Management Alliance and US Secret Service Special Agent Mark Grantz as they
     
    •Dig deep into the inner workings of advanced cyber criminal gangs
    •Share how law enforcement agents, like Mark Grantz, keep pace and take down these criminal outfits and police cyberspace.
    •Share best practice tips and strategies on securing your organisation.
     
    Joining Mark and Amar are Ronny Wolf from GFI, Brian Laing from Lastline and cyber and data privacy expert Chris Payne from Advanced Cyber Solutions.
  • How to Prepare for Phase 2 HIPAA Compliance Audits
    How to Prepare for Phase 2 HIPAA Compliance Audits Joseph Kirkpatrick, Managing Partner, KirkpatrickPrice; Chris Swift, Product Manager, LockPath Recorded: Oct 3 2017 64 mins
    The U.S. Department of Health & Human Services Office for Civil Rights announced on March 21, 2016 that Phase 2 of HIPAA audits have officially begun. A year later, more than 200 desk audits have occurred, however covered entities and their business associates are still struggling to know what to focus on and in which areas they are lacking safeguards.

    In this webcast, KirkpatrickPrice’s Joseph Kirkpatrick and LockPath’s Chris Swift will discuss the lessons learned from HIPAA enforcement actions to date and what to expect from the OCR in 2018. Attendees will discover:

    • Trends from Phase 1 and 2
    • Key takeaways from Phase 2 desk audits
    • What the delayed on-site audits means for 2018
    • What you can do to proactively prepare for that inevitable knock
  • Making Information Security Actionable with GRC
    Making Information Security Actionable with GRC Sam Abadir, Director of Product Management, LockPath Recorded: Oct 2 2017 30 mins
    Cyber risk is not only a present danger, but it’s also overwhelming at most organizations. IT departments are inundated with vulnerabilities and unable to analyze them in a timely fashion. Meanwhile, the C-suite is clamoring for evidence to support their risk management decisions.

    Governance, risk management, and compliance (GRC) processes make cyber risk data actionable for both IT departments and the executive ranks. In this LockPath webinar, you’ll learn the areas GRC impacts and how one organization uses a GRC platform to prioritize vulnerabilities, while delivering visibility and accountability. Specifically, you’ll learn:

    • The role of information security in your GRC program.
    • How GRC processes can make your data actionable, driving better business decisions.
    • How one organization employed GRC to strengthen its vulnerability management program.
  • Turning Audit Into Enablement
    Turning Audit Into Enablement Joseph Kirkpatrick, Managing Partner, KirkpatrickPrice; Sam Abadir, Director of Product Management, LockPath Recorded: Sep 28 2017 63 mins
    Audits strengthen business operations, yet many organizations fear audits. Joseph Kirkpatrick of KirkpatrickPrice will share his insights and expertise on the auditing process and offer key takeaways for leveraging audits to gain a competitive advantage. In this webinar, you’ll learn how audits can:

    • Enable a business to work with “at risk” vendors
    • Improve privacy and security while enhancing brand trust
    • Prevent fines and data breaches
    • Strengthen and mature your overall risk program
  • Payment transaction monitoring use cases
    Payment transaction monitoring use cases Siti Chen, Senior solutions engineer, IR Recorded: Sep 28 2017 29 mins
    Monitoring POS or ATM transactions is complex. Hear the latest in how industry leading Prognosis software helps large Financial institutions monitor fraudulent activity and up-time across payments networks.
  • Insights with Cyber Leaders - Adel Al Hosani CISO UAE Customs
    Insights with Cyber Leaders - Adel Al Hosani CISO UAE Customs Amar Singh CEO Cyber Management Alliance Recorded: Sep 27 2017 25 mins
    Amar Singh, CEO and co-founder of Cyber Management Alliance, took the opportunity to discuss cyber security and information management with Adel Al Hasani, CISO and Head of Information Security for the UAE Government.
  • Initial Coin Offerings: Regulatory Analysis by Jurisdictions Worldwide
    Initial Coin Offerings: Regulatory Analysis by Jurisdictions Worldwide Angela Chartrand, Sarah Hody, Neal Reiter, Marco Santori Recorded: Sep 27 2017 65 mins
    Initial Coin Offerings (ICOs), Token Sales, Token Generating Events (TGE) are now all the rage. They are on the news, on your LinkedIn feed, on Twitter hashtags, and even on the Legislators' agendas… The US, Canada, and China are at the forefront of ICOs regulation, either defining them, supporting them, or banning them; and this is why it is important to understand the regulatory compliance implications these crowdfunding modalities carry, the legal framework that applies, and how to prepare - compliance wise - for a successful ICO.

    With this in mind we’ve put together this AML regulations primer, a webinar with the little details you need to know and understand before you start your journey into crypto-land and prepare for your upcoming ICO.

    Join:
    Angela Chartrand - Founder at Sentinence,
    Sarah Hody - Associate at Perkins Coie,
    Marco Santori - Partner at Cooley, and
    Neal Reiter (Moderator) - Director of Product at IdentityMind Global, in discussing:

    - The Regulatory Framework in the US, Canada, China, and other countries around the world
    - How to know if you are a security
    - Jurisdiction questions between different Government Agencies
    - The benefits of a Regulatory Sandbox
    - What kind of compliance do you need to do?
  • Holy ****, The Case is Filed!  What Do I Do Now?
    Holy ****, The Case is Filed! What Do I Do Now? Doug Austin and Tom O'Connor Recorded: Sep 27 2017 66 mins
    The first days after a complaint is filed are critical to managing the eDiscovery requirements of the case efficiently and cost-effectively. With a scheduling order required within 120 days of the complaint and a Rule 26(f) “meet and confer” conference required at least 21 days before that, there’s a lot to do and a short time to do it. Where do you begin? This CLE-approved* webcast will discuss the various issues to consider and decisions to be made to help you meet your discovery obligations in an efficient and proportional manner. Topics include:

    + What You Should Consider Doing before a Case is Even Filed
    + Scoping the Discovery Effort
    + Identifying Employees Likely to Have Potentially Responsive ESI
    + Mapping Data within the Organization
    + Timing and Execution of the Litigation Hold
    + Handling of Inaccessible Data
    + Guidelines for Interviewing Custodians
    + Managing ESI Collection and Chain of Custody
    + Search Considerations and Preparation
    + Handling and Clawback of Privileged and Confidential Materials
    + Determining Required Format(s) for Production
    + Timing of Discovery Deliverables and Phased Discovery
    + Identifying eDiscovery Liaison and 30(b)(6) Witnesses
    + Available Resources and Checklists

    Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • How Governments Can Adapt - Making Digital Transformation a Reality
    How Governments Can Adapt - Making Digital Transformation a Reality Keith Dawson - Principal Analyst, 451 Research, Michael Mueller- Director - Solutions Management, CenturyLink Recorded: Sep 27 2017 53 mins
    Can government institutions use modern tools and technologies to become more flexible and responsive to their constituents? What should they be looking at, and how should they adapt to the challenges of data security, privacy, and reliance on legacy systems? Digital transformation is an ambitious project for any organization; government decision-makers are hoping it will provide a path to broader citizen engagement, empowered employees, and new digital infrastructures that will provide better access to data and services.

    In this webinar we will discuss the results of a survey on the challenges and imperatives of digital transformation, including the perspectives of government managers on their technology and operational challenges and expectations.
  • Is Your Supply Chain About to Be Disrupted Again? Analytics Provides the Answer.
    Is Your Supply Chain About to Be Disrupted Again? Analytics Provides the Answer. Nick Wildgoose, Zurich Insurance, and Jon Ball, Dun & Bradstreet Recorded: Sep 27 2017 42 mins
    Join our webinar led by Nick Wildgoose – Global Supply Chain Product Leader at Zurich Insurance and Jon Ball – Senior Global Director, Analytic Consulting at Dun & Bradstreet, to hear the results of the latest market research. You’ll learn at which tiers in the supply chain disruptions are occurring more frequently and the causes of these disruptions. Nick and Jon will be providing you with a greater understanding of the challenges and opportunities facing companies across North America and Europe to improve supply chain resilience. They will also describe the innovations being brought in terms of supply chain risk assessment, technology, and transfer to help protect financial performance.
  • Insights with Cyber Leaders - Taiye Lambo Former CISO of Atlanta City
    Insights with Cyber Leaders - Taiye Lambo Former CISO of Atlanta City Amar Singh CEO Cyber Management Alliance Recorded: Sep 27 2017 18 mins
    Cyber Management Alliance had the pleasure recently to talk to Taiye Lambo, former CISO for Atlanta, about his early career in IT, moving from Nigeria to London, and then onto Atlanta, and the way he has crossed over from full time positions to an entrepreneur, and back again. Taiye also gave us his views on certifications, why knowledge is important and his love of mentorship.
  • Cultivating Your Strategic and Creative Thinking
    Cultivating Your Strategic and Creative Thinking Dr. Ted Marra Oct 18 2017 2:00 pm UTC 75 mins
    Join our guest, Dr. Ted Marra as he introduces his new strategic leadership course in Global Risk Academy.

    During the webinar we will cover:

    How does a truly strategic organization think? What is strategic thinking versus strategic planning? What are the vital few factors that will determine your organisation’s long-term success or failure and are they on your radar screen?

    Who should attend.

    People with 10 years management experience minimum up to and including C-Level in all disciplines responsible for strategic decisions or large scale operational issues - so they have large budget and many people reporting to them.

    Managers and senior management from all areas of the organisation having responsibility for planning and achievement of key business objectives.

    Why you should attend.


    - Reflect on how you got where you are as an organisation;

    - What factors were critical to your success? What factors were the basis for your success?

    - What held you back – prevented you from being even more successful?
    - What could you have done differently


    Understand what are the most critical factors that will better ensure your organisation is a “winner” in the future (e.g., next 3-5 years).

    Find out which ones you may be missing and what to do about it before it’s too late and you become just an “average or good” organisation when, with a little effort and the right strategic thinking and creativity, you could take the organisation to the next level of performance and move toward “greatness”.

    How to build exceptional stakeholder relationships and why doing this is critical in especially in turbulent times.
  • Post GDPR World - What Are Your Chances of Survival?
    Post GDPR World - What Are Your Chances of Survival? Amar Singh & Chris Payne Oct 19 2017 1:00 pm UTC 60 mins
    With the greatest shake-up of data protection regulation in a generation looming, CISOs, DPOs and IT Administrators are busy planning for the changes needed for their organisations to be compliant. But with 60% of IT executives suggesting staff as their biggest threat to adherence (Bluesource, 2017) and 90% of staff admitting to violating policies designed to prevent security incidents (BSI, 2017), have they really addressed the issue of friendly fire?

    In this live, informative and interactive webinar led by Amar Singh, Global CISO & CEO of Cyber Management Alliance. A panel of data security and policy experts will discuss, why staff remain such an active threat to GDPR compliance, why policies are being ignored and how to ensure that your staff are on-board with the GDPR before May 2018.

    Panellists:

    Amar Singh, Global CISO & CEO, Cyber Management Alliance
    Chris Payne, Data Privacy Expert & Managing Director, Advanced Cyber Solutions
    Dominic Saunders, CTO and Co-Founder, NETconsent
    Joe Lee – UK and Ireland Commercial Manager, NETconsent
  • Customer Due Diligence after the Money Laundering Regulations 2017
    Customer Due Diligence after the Money Laundering Regulations 2017 Jane Jee, CEO, Kompli-Global Oct 19 2017 1:00 pm UTC 45 mins
    Do you really know your customer? Customer Due Diligence after the Money Laundering Regulations 2017 and the Criminal Finances Act 2017

    * How do you ensure you conduct a thorough search for, and provide ongoing monitoring of, adverse information on existing and potential clients?
    * How do you prove you are conducting compliant CDD?
  • Webinar Part II: Changes to SBA's Environmental Guidelines
    Webinar Part II: Changes to SBA's Environmental Guidelines James Haberlen Oct 19 2017 6:00 pm UTC 30 mins
    The updated SOP was released by the SBA last Friday.

    EDR is pleased to host Part II of last week’s webcast where we’ll focus exclusively on changes to the environmental guidelines. This 20-minute webinar is a must attend for anyone originating SBA 504 or 7a loans.
    Version J of SOP 50 10 5 represents the agency’s first update to its environmental guidance since 2014 (when it adopted the revised ASTM Phase I E 1527 standard). EDR’s James Haberlen will provide a timely update on what this round of changes mean to the environmental due diligence required on any loans seeking the SBA’s approval.
  • How to Get More Personal Data Without the Risk
    How to Get More Personal Data Without the Risk Nathan Rowe, Chief Product Officer, Evident Oct 24 2017 6:00 pm UTC 45 mins
    Personal data is essential for your business - to enable trust and safety, to enable personalization of services, to enable growth of your business and to enable verification of identities. While obtaining and managing personal data is necessary, it can be extremely complicated, time consuming and risky. Handling or holding sensitive data can lead to major security threats. Companies are investing more time and energy to effectively acquire, manage and protect the personal information of their users and workforce to the detriment of their own business focus. Additionally, the regulatory requirements and liability that accompany any interaction with personal data continue to increase, putting additional strain on businesses to stay updated and compliant.

    From a user perspective, as individuals are asked to provide their information more broadly, security concerns and a loss of control become more prevalent, putting once-standard interactions at risk. These put even more pressure on businesses to protect their communities’ information as well as their brand equity.

    This presentation will discuss what challenges are faced by companies dealing with personal data related issues. We will cover best practices, real world examples and lessons learned as businesses look to increase their access to the answers they need, while reducing their risk and liability.

    Key takeaways
    - Best practices for how to share and secure personal information
    - Pitfalls to avoid as you grow your organization and expand offerings
    - Hear real world examples on how businesses engage with their communities and personal data
  • Reduce Friction and Cut Compliance Costs with Digital ID Verification
    Reduce Friction and Cut Compliance Costs with Digital ID Verification Joe Bloemendaal, Vice President, Sales EU, Mitek Systems; Chris Phillips, Compliance Department, Gain Capital Oct 25 2017 2:00 pm UTC 45 mins
    The latest EU Anti-Money Laundering directive will significantly increase the frequency with which financial service providers need to conduct ‘Know Your Customer’ (KYC) checks. To maximise the effectiveness of digital transformation initiatives, financial services and other regulated industries must find effective digital identity verification solutions.

    Current methods for identity verification checks place an enormous cost burden on banks, payments processors, and lenders, as most methods rely heavily on manual processes. Furthermore, these processes are cumbersome for users, driving away potential customers.

    Figuring out how to balance the competing needs of compliance and costs against the expectations of today’s digital native users is key to any financial service provider looking to win and retain new customers.
  • Lessons Learned from Recent eDiscovery Disasters
    Lessons Learned from Recent eDiscovery Disasters Doug Austin and Tom O'Connor Oct 25 2017 5:00 pm UTC 75 mins
    The recent eDiscovery failures at Wells Fargo and at the Department of Justice show that eDiscovery mistakes and failures happen even at the largest corporations and government agencies. This CLE-approved* webcast will discuss the various issues that occurred in these high-profile cases and what to do to avoid them in your own cases. Topics include:

    + Attorney Duty of Competence
    + Managing Communications: Attorney Responsibilities
    + Managing Communications: Vendor Responsibilities
    + Recommended Workflows for Tracking Review
    + Common Redaction Mistakes and How to Avoid Them
    + Checking for Personally Identifiable Information (PII)
    + Key Takeaways for Better eDiscovery Project Management

    Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • Using GRC to Tackle IT Risk Management
    Using GRC to Tackle IT Risk Management Sam Abadir, Director of Product Management, LockPath Oct 26 2017 4:00 pm UTC 60 mins
    As business becomes more digital, companies are finding that managing risk is becoming more and more chaotic and expensive. Adding to the complication, technology is often not solely managed by the IT department. Marketing, sales operations, department operations, support, and more are increasingly taking control of their own IT. Ensuring teams enterprise-wide are using best practices for IT, adhering to frameworks and regulations, and complying with their contractual obligations has escalated into a difficult battle – one with potentially large consequences if waged poorly.

    In this session you will learn:
    • How companies are bringing order to the chaos of IT risk management using integrated risk management tools like Keylight
    • Where your organization lives on an IT Risk maturity model
    • Tactical steps to take to make your IT risk management processes more efficient and effective
    • How your organization can manage and report IT risks to every role in the organization
  • Digital Coin Offerings: Recent SEC Guidance and Tax Considerations
    Digital Coin Offerings: Recent SEC Guidance and Tax Considerations Morrison & Foerster's Joshua Klayman, Jay Baris, Alfredo Silva, Daniel Kahan and Shuikay Hung Oct 31 2017 4:00 pm UTC 90 mins
    Token sales, also known as ICOs, represent a new capital-raising method that is being explored by a variety of companies in the market. In the past few months, the US Securities and Exchange Commission (SEC) has provided guidance concerning token sales. Although the SEC did not declare that all digital tokens constitute securities, it cautioned that certain tokens may be securities and that existing securities frameworks apply to token sales, notwithstanding that digital tokens may be distributed via distributed ledger technology.

    In addition, the IRS has published guidance relating to tokens that are “convertible virtual currencies” and has indicated that such tokens generally are treated as property for US federal income tax purposes.
    Token sales, and the legal and regulatory landscapes in the US and around the world with respect to digital tokens, continue to evolve.

    This webinar will explore the current legal, regulatory and tax landscape relating to token offerings and will consider the following:

    •What are digital tokens and how are they typically used and sold?
    •What guidance has the SEC provided regarding token sales, and what is the significance of that guidance?
    •What guidance has the IRS provided regarding tokens and what tax considerations are relevant to tokens and token sales?
    •What are some of the other legal matters that token issuers and their counsel should be aware of when contemplating launching token sales?
  • Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider
    Getting the Most from Big Data: The Benefits of Partnering with a DBaaS Provider Jim Curtis 451 Research, Steve Croce, Product Manager for ElasticSearch and DBaaS Object Rocket Oct 31 2017 6:00 pm UTC 60 mins
    Clearly, the onslaught of data, particularly big data, continues to cause many organizations to look for new ways in which to store, analyze, and manage that data. Cloud computing from public cloud vendors is often one place in which enterprises turn. Traditionally deployed and managed on-premises, databases are the lifeline of many enterprises. And while the cloud is appealing for a number of reasons, there are still questions on the minds of many organizations in choosing the right cloud partner to manage their database in the cloud.
  • MiFID II and Call Recording Compliance
    MiFID II and Call Recording Compliance Alick Smith | Rhian McPhail Nov 8 2017 10:00 am UTC 30 mins
    MifID II is coming this webinar will cover off what you need to know from a call recording perspective.
  • Best Practices in Global Risk Management
    Best Practices in Global Risk Management Frank Cirillo, Dun & Bradstreet and Jack Scarpelli, Xerox Corporation Nov 8 2017 4:00 pm UTC 45 mins
    Join our webinar led by Frank Cirillo, Sr. Consultant Advanced Analytics, Dun & Bradstreet and Jack Scarpelli, VP North America Credit Risk Officer, Xerox Corporation. In this session, Frank and Jack will be discussing the growing trends toward globally consistent risk management, the barriers many face and steps that can be taken to overcome those barriers. As companies shift from decentralized, judgmental, manual procedures to a centralized, statistically-based, automated process, they will discuss the positive impact on KPIs and how to make it less overwhelming to execute on a global strategy.
  • Road to GDPR: Critical Data Privacy Compliance
    Road to GDPR: Critical Data Privacy Compliance Ilanko Subramaniam, Director - Risk, Compliance and Data Protection, Templar Shield; Shane Westrup, Manager, LockPath Nov 9 2017 5:00 pm UTC 60 mins
    GDPR compliance designed to protect personal information of EU citizens will be a complex and time-consuming undertaking for most organizations. The challenge is interpreting the regulation and incorporating the appropriate processes and technologies to protect personal data of EU employees. The discussions will start with establishing a Privacy program to support data strategy and drive a compliance roadmap. In this webinar, Templar Shield’s Ilanko Subramaniam and LockPath’s Shane Westrup will discuss the basic tenets of the General Data Protection Regulation, building out a data privacy and security program, and utilizing tools to help your organization establish the necessary framework to comply with this regulation.

    -----------------------------------------------------------------------------

    Disclaimer/No Attorney-Client Relationship/No Legal Advice
    The information presented is not legal advice or a legal opinion, and it may not necessarily reflect the most current legal developments. You should seek the advice of legal counsel of your choice before acting upon any of the information presented
  • How to Trace Dirty Money
    How to Trace Dirty Money Carrie Tendler, Randall Arthur (both Kobre & Kim), James Mintz (Mintz Group) & George "Ren" McEachern (FBI) Nov 13 2017 4:00 pm UTC 75 mins
    Coordinating Legal and Investigative Fact Finding to Recover Hidden Assets

    Kobre & Kim and Mintz Group will draw on their substantial experience in asset tracing and recovery to present on how legal teams and investigators can develop coordinated investigative strategies, including exploiting judicial mechanisms, to locate and recover debtor’s assets across multiple jurisdictions. The panel will outline the common steps debtors take to hifr and structure assets and—in turn— how each of these steps provide opportunities for investigators and legal teams to find assets. Among the questions the panel will seek to answer are:
    •What judicial mechanisms in debtors’ favored jurisdictions can assist in tracing and recovering assets?
    •Are the patterns in how subjects hide assets the same around the world?
    •Are the patterns subjects use to hide and structure assets the same regardless of whether they are clean or dirty?
  • Digitized identity verification - the future of ID & KYC
    Digitized identity verification - the future of ID & KYC Sarah Clark, General Manager- Identity, Mitek Systems, Mike Montemarano, KYC Officer and Onboarding Specialist JP Morgan Nov 14 2017 4:00 pm UTC 45 mins
    Financial institutions from all over the world are facing increasingly strict regulations regarding the verification and authentication of their customers’ identity. Furthermore, with the increasing amount of data breaches, status-quo identity verification processes have not only been compromised but have also made complying with current regulations harder. This ever-changing environment has forced a tipping point for organizations to regard the adoption of new technologies for identity verification as a must-have rather than a nice-to-have.

    In the end, financial institutions must satisfy consumers’ demands for speed and ease of use to prevent them from going to the competition. To gain a competitive edge, remain compliant, and offer a frictionless and user experience, it is imperative for FIs to invest in technologies that bridge the compliance-convenience gap.
  • Murphy’s eDiscovery Law: How to Keep What Could Go Wrong From Going Wrong
    Murphy’s eDiscovery Law: How to Keep What Could Go Wrong From Going Wrong Doug Austin and Tom O'Connor Dec 1 2017 6:00 pm UTC 75 mins
    As data complexity, discovery costs, and regulatory challenges increase in volume and impact, the pulse rate of publicly highlighted eDiscovery mistakes continues to build. While these mistakes are unfortunate for those who experienced them, they can be beneficial to the rest of us in highlighting mistakes you can avoid in your own cases. During this free, one-hour, CLE* presentation, eDiscovery experts Doug Austin and Tom O'Connor will discuss examples of recent eDiscovery disasters and highlight the common characteristics of those disasters and what can be done to avoid them in your own cases. Topics include but are not limited to:

    + Attorney Duty of Competence
    + Avoiding the Mistake in Assuming that Discovery Begins When the Case is Filed
    + How to Proactively Address Inadvertent Privilege Productions
    + Up Front Planning to Reduce Review Costs
    + How to Avoid Getting Stuck with a Bad Production from Opposing Counsel
    + Understanding Your Data to Drive Discovery Decisions
    + Minimizing Potential ESI Spoliation Opportunities
    + How to Avoid Processing Mistakes that Can Slow You Down
    + Common Searching and Redaction Mistakes and How to Avoid Them
    + Checklist of Items to Ensure a Smooth and Accurate Production
    + Managing Communications: Attorney and Vendor Responsibilities

    Presentation Leader: Doug Austin

    Doug is the VP of Operations and Professional Services for CloudNine. At CloudNine, Doug manages professional services consulting projects for CloudNine clients. Doug has over 25 years of experience providing legal technology consulting, technical project management and software development services to numerous commercial and government clients.

    Special Consultant to CloudNine: Tom O'Connor

    Tom O’Connor is a nationally known consultant, speaker, and writer in the field of computerized litigation support systems. Tom’s consulting experience is primarily in complex litigation matters.

    * MCLE Approved in Selected States
  • Hit F5: Does Your Risk Management Policy Need to be Refreshed?
    Hit F5: Does Your Risk Management Policy Need to be Refreshed? K.C. Conway, MAI, CRE, Economist, Counselor of Real Estate, Valuation Expert Dec 6 2017 6:00 pm UTC 60 mins
    This expert panel will take a candid look at the importance of robust risk management at this stage of the market cycle. Looking back, there have been important milestones in the evolution of risk management from the early days of “Phase I or no Phase I?” decisions based solely on loan size. Other areas—like the alignment of the appraisal function and environmental risk management function—are still evolving. As the market enters a phases of moderating property values, lenders should be turning a close eye on their risk management practices. The impact an environmental issue may have on a property’s value is more significant as prices decline. Risk managers who are being challenged to make a case for tighter underwriting will learn valuable ammo for explaining why ERM is more important than ever. Attendees will also learn more about the future direction of regulatory guidance to better reflect budding industry best practices.

    Moderator:
    K.C. Conway, MAI, CRE, Economist, Counselor of Real Estate, Valuation Expert
    Speakers:
    Michael Pereira, CHMM, VP – Environmental Risk Officer, Umpqua Bank
    Michael Kulka, Founder and CEO, PM Environmental, Inc.
    Duane Beck, Enterprise Accounts Director, Lender Solutions, EDR
  • Enterprise Risk Assessments for Immediate Value and Results
    Enterprise Risk Assessments for Immediate Value and Results Yvette Connor & Jannie Wentzel, Focal Point Data Risk; Sam Abadir, LockPath Dec 7 2017 5:00 pm UTC 60 mins
    Enterprise-level risk assessments are a business necessity today in light of data breaches, global outsourcing, and regulatory compliance challenges like GDPR. In this webinar, LockPath and Focal-Point will discuss strategies and best practices for creating and leveraging enterprise risk assessments. Attendees will learn:

    • Common goals and objectives for enterprise risk assessments
    • How to define assessment metrics
    • When to determine if a risk assessment is needed
    • When to use an integrated assessment vs. an individual assessment

    This is a can’t miss webinar for anyone responsible for enterprise-level risk and concerned about threats to business operations.